---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <
nww_newsletters@newsletters.networkworld.com>
Date: Jun 2, 2014 2:01 PM
Subject: The Internet of Things gets real
To: <
aquarianm@gmail.com>
Cc:
Network World Daily News PM | | A year ago, people were mostly talking about the potential of the Internet of Things (IoT) — what companies and government entities might do in the future to take advantage of this widespread network of connected objects. | | Issue highlights 1. 77% of lawyers can't be trusted … with your confidential data 2. Bell Canada field-service techs say 'Goodbye laptops, hello smartphones' 3. Internet guru Mary Meeker says enterprise technology is getting cheaper 4. Google plans investment in satellite fleet to connect remote parts of the world 5. Future of secure messenger in doubt after Pirate Bay arrest 6. Windows 7 powers more than half of all PCs 7. Demand for extra-large iPhone may be overstated 8. ABM overcomes pro-VMware bias to adopt Microsoft's Hyper-V 9. 1 year of NSA leaks later, it's time to take back your privacy: Reset the Net 10. Beware the next circle of hell: Unpatchable systems | WEBCAST: Xirrus Date: Thursday, June 26, 2014, 2:00 PM EDT It isn't news that wireless networks are being pushed to the limits every day and IT organizations are under duress to deliver a reliable wireless network to meet the demands of users. Learn more! | When using email to communicate, more than three-quarters of all lawyers treat their clients' confidential information with all the care you'd expect from a teenager posting to Facebook, according to a new survey. Only 22 percent claim to use encryption. And a full 77% cop to relying solely on "confidentiality statements," otherwise known as virtually nothing. READ MORE | Thousands of Bell Canada field technicians this fall will begin doing their jobs of installing and testing telecom and media services connections with help from custom-designed smartphone apps rather than via their laptops. It's all part of what Bell Canada is calling its "One Device" mobile initiative, in essence, a mobility makeover. READ MORE | Every year, the Internet community waits breathlessly for Mary Meeker's Internet Trends presentation, where the celebrated Kleiner Perkins Caufield & Byers tech analyst lays out what's happening in a series of insightful charts and graphs. READ MORE | WHITE PAPER: Dell Boomi Thinking of using traditional middleware solutions for cloud and mobile integration scenarios? Read this case study to learn how Novartis leveraged Dell Boomi to achieve greater agility, reduce development efforts and experience a lower TCO. Read now! | After experimenting with high altitude balloons, Google is now also looking use a fleet of low-earth-orbit satellites to bring Internet access to remote regions of the world. READ MORE | The arrest of Peter Sunde for his involvement with The Pirate Bay has put the future of his latest project, a spy-proof text messaging app, in doubt. READ MORE | As Windows XP continued its decline, users who deserted the obsolete operating system shifted to Windows 7, not the newer Windows 8, more circumstantial evidence that commercial customers, not consumers, now drive PC sales. READ MORE | WHITE PAPER: APC by Schneider Electric This white paper compares the cost benefits of both Standardized and Containerized data center cooling infrastructures, presents the advantages and disadvantages of each, and identifies which environments can best leverage the facility module approach. Learn More | Although Apple watchers expect the company to boost the iPhone's screen size this fall, demand for a very large display is actually weak among iPhone owners in China -- and even weaker in the U.S. READ MORE | Saving about $2 million was the primary reason international business-facility management firm ABM decided to convert its virtual infrastructure from VMware's vSphere to Microsoft's Hyper-V, but that came only after a period of having Microsoft prove that its virtual environment was ready. READ MORE | June 5 marks the one-year anniversary of the first documents leaked by Edward Snowden. READ MORE | Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling READ MORE | WEBCAST: Fortinet With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions. Learn more >> | | | | | | | | |
No comments:
Post a Comment